咨询与建议

限定检索结果

文献类型

  • 29 篇 会议

馆藏范围

  • 29 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 14 篇 计算机科学与技术...
    • 14 篇 软件工程
    • 12 篇 信息与通信工程
    • 6 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 1 篇 电气工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 5 篇 理学
    • 3 篇 数学
    • 2 篇 物理学
    • 2 篇 统计学(可授理学、...
    • 1 篇 生物学

主题

  • 14 篇 cryptography
  • 6 篇 data security
  • 4 篇 security of data
  • 3 篇 protocols
  • 2 篇 digital radio
  • 2 篇 public key crypt...
  • 2 篇 personal communi...
  • 2 篇 linear predictiv...
  • 2 篇 speech coding
  • 2 篇 spread spectrum ...
  • 2 篇 communication st...
  • 1 篇 jamming
  • 1 篇 frequency shift ...
  • 1 篇 communication sy...
  • 1 篇 cordless telepho...
  • 1 篇 alarm systems
  • 1 篇 communication sy...
  • 1 篇 data communicati...
  • 1 篇 internet
  • 1 篇 radio propagatio...

机构

  • 2 篇 ascom tech ag so...
  • 1 篇 department of el...
  • 1 篇 eurecom inst sop...
  • 1 篇 univ bradford un...
  • 1 篇 speech of proces...
  • 1 篇 ibm zurich resea...
  • 1 篇 univ of london u...
  • 1 篇 cryptography & c...
  • 1 篇 telecommunicatio...
  • 1 篇 royal holloway u...
  • 1 篇 eurecom institut...
  • 1 篇 institute of inf...
  • 1 篇 univ of manchest...
  • 1 篇 chubb alarms ltd...
  • 1 篇 hull-lancaster c...
  • 1 篇 univ of hull hul...
  • 1 篇 simoco europe lt...
  • 1 篇 aston univ unite...
  • 1 篇 british telecomm...
  • 1 篇 guildford surrey...

作者

  • 2 篇 s.j. shepherd
  • 2 篇 honary b.
  • 1 篇 sun dong-mei
  • 1 篇 r.l. brewster
  • 1 篇 f. piper
  • 1 篇 darnell m.
  • 1 篇 h.m. yung
  • 1 篇 c. brookson
  • 1 篇 yung h.m.
  • 1 篇 birch david g.w.
  • 1 篇 edgar j.
  • 1 篇 d. chater-lea
  • 1 篇 c.a. boyd
  • 1 篇 xydeas c.s.
  • 1 篇 d.g.w. birch
  • 1 篇 m. darnell
  • 1 篇 piper fred
  • 1 篇 stannard christo...
  • 1 篇 m. walker
  • 1 篇 d.j. hiotakakos

语言

  • 29 篇 英文
检索条件"任意字段=IEE Colloquium on Security and Cryptography Applications to Radio Systems"
29 条 记 录,以下是1-10 订阅
排序:
A secure mechanism for network authentication combining hand shapes verification and encryption  6
A secure mechanism for network authentication combining hand...
收藏 引用
6th International Conference on Signal Processing, ICSP 2002
作者: He, Bing Qiu, Zheng-Ding Sun, Dong-Mei Institute of Information Science Northern Jiaotong University Beijing100044 China
With the rapid growth of information technologies, biometrics is being used more and more widely in applications for accessing databases or business systems. These applications need to implement measures to counter th... 详细信息
来源: 评论
Encrypted video over tetra
Encrypted video over tetra
收藏 引用
作者: Samarakoon, M.I. Honary, B. Rayne, M. Department of Communication Systems Lancaster University Lancaster LA1 4YR SIMOCO Europe Ltd. St. Andrews Road Cambridge CB4 1DP
The Terrestrial Truncked radio (TETRA) system uses end-to-end encryption in addition to the air interface encryption to provide enhanced security. End-to-end encrypted continuous data, such as video, requires synchron... 详细信息
来源: 评论
Proceedings of the iee colloquium on security and cryptography applications to radio systems
Proceedings of the IEE Colloquium on Security and Cryptograp...
收藏 引用
Proceedings of the iee colloquium on security and cryptography applications to radio systems
The proceedings contains 11 papers. Topics discussed include: cryptography and data security systems;mobile telecommunication systems;network protocols;standards;microporcessor chips;cellular telephone systems;and the... 详细信息
来源: 评论
iee colloquium on 'security and cryptography applications to radio systems' (Digest No.1994/141)
IEE Colloquium on 'Security and Cryptography Applications to...
收藏 引用
iee colloquium on security and cryptography applications to radio systems
来源: 评论
Lessons learned from security weaknesses in the Netscape World Wide Web browser
Lessons learned from security weaknesses in the Netscape Wor...
收藏 引用
iee colloquium on Public Uses of cryptography
作者: S.J. Shepherd Cryptography & Computer Security Unit in the Telecommunications Research Group Electrical Engineering Department Bradford UK
"The Net" is universally recognised as offering a revolution in communications way beyond the limited applications for which it is currently being used. The opportunities for business, commerce and finance a... 详细信息
来源: 评论
security in PMR systems
Security in PMR systems
收藏 引用
iee colloquium on security in Networks (Digest No. 1995/024)
作者: D. Chater-Lea Jaya Close Motorola LMPS Basingstoke UK
Private mobile radio (PMR) systems provide two way communications for use in private business applications. Their application may be described as "Teamwork over Distance", enabling groups of users to remain ...
来源: 评论
Engineering wide radio systems
Engineering wide radio systems
收藏 引用
Proceedings of the iee colloquium on security and cryptography applications to radio systems
作者: Stannard, Christopher Telecom, Philips
To understand the problems that are faced when implementing speech security, it is necessary to review the sort of systems that police forces and security companies have, why the systems themselves are used the way th... 详细信息
来源: 评论
Management of security
Management of security
收藏 引用
Proceedings of the iee colloquium on security and cryptography applications to radio systems
作者: Piper, Fred Univ of London London United Kingdom
The need for sound security management should not be overlooked. The management of security is a major topic whose importance has been widely recognized. The paper presents a summary of a lecture on the Management of ... 详细信息
来源: 评论
Mobile communications security - Private or public
Mobile communications security - Private or public
收藏 引用
Proceedings of the iee colloquium on security and cryptography applications to radio systems
作者: Birch, David G.W. Shaw, Ian J.
The paper looks at the subject of secure mobile radio communications and the issues that are raised when the right to privacy is tested against the need to know. The issues are illustrated using two major examples: th... 详细信息
来源: 评论
Cryptographic security for the new Trans-European Trunked radio (TETRA) standard
Cryptographic security for the new Trans-European Trunked Ra...
收藏 引用
Proceedings of the iee colloquium on security and cryptography applications to radio systems
作者: Riess, Hans Peter Ascom Tech AG Solothurn Switzerland
TETRA is currently being standardized by the European Telecommunications Standards Institute's (ETSI) Sub Technical Committee 6 on radio Equipment and systems (RES6). It allows speech and data communications withi... 详细信息
来源: 评论